An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks

Size: px
Start display at page:

Download "An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks"

Transcription

1 Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE INFOCOM 2010 proceedngs Ths paper was presented as part of the man Techncal Program at IEEE INFOCOM An Attack-Defense Game Theoretc Analyss of Mult-Band Wreless Covert Tmng Networks S. Anand Department of ECE Stevens Insttute of Technology Hoboken, NJ Emal: asanthan@stevens.edu S. Sengupta Department of Mathematcs & Computer Scence John Jay College, Cty Unversty of New York New York, NY Emal: ssengupta@ay.cuny.edu R. Chandramoul Department of ECE Stevens Insttute of Technology Hoboken, NJ Emal: moul@stevens.edu Abstract We dscuss malcous nterference based denal of servce (DoS attacks n mult-band covert tmng networks usng an adversaral game theoretc approach. A covert tmng network operatng on a set of multple spectrum bands s consdered. Each band has an assocated utlty whch represents the crtcal nature of the covert data transmtted n the band. A malcous attacker wshes to cause a DoS attack by sensng and creatng malcous nterference on some or all of the bands. The covert tmng network deploys camouflagng resources to approprately defend the spectrum bands. A two ter game theoretc approach s proposed to model ths scenaro. The frst ter of the game s the sensng game n whch, the covert tmng network determnes the amount of camouflagng resources to be deployed n each band and the malcous attacker determnes the optmal sensng resources to be deployed n each band. In the second ter of the game, the malcous attacker determnes the optmal transmt powers on each spectral band t chooses to attack. We prove the exstence of Nash equlbrums for the games. We compare the performance of our proposed game theoretc mechansm wth that of other well known heurstc mechansms and demonstrate the effectveness of the proposed approach. Index Terms Tactcal covert network, attack, defense, adversaral game, prcng, Nash equlbrum. I. INTRODUCTION Covert channels [1 refer to transfer of nformaton n a stealthy manner by hdng the communcaton as an underlay to another applcaton lke voce over nternet protocol (VoIP, fle transfer protocol (FTP, hyper-text transfer protocol (HTTP, etc. The stealth n data transfer can be acheved by deployng covert storage channels [2, [3 where the transmtter modfes certan bts n the headers of packets or modfes certan data n some memory locatons to convey nformaton to the recever. Another means of covert data transfer s the tmng channel [4-[8 (and the references theren, n whch a transmtter transmts covert nformaton by modfyng the nter-packet delays of the overlay applcaton. As an example, transmtters could delay overlay packets by an amount of tme, t 1 to transmt a covert one bt and a tme amount, t 0, to transmt a covert zero bt. Dependng on the overlay applcaton, the performance of the covert tmng channel can be enhanced. Capacty analyss of covert tmng channels s presented n [4, where bounds are provded for the achevable capacty. Ths was extended by Wang and Lee [5 to nclude the synchronzaton overheads. Transfer of covert nformaton usng arrval tmes n queues s presented n [6. In [7, Wagner and Anantharam consder the exponental servce tmng channel (ESTC and compute the zero relablty rate and propose a dstance metrc to acheve bounds on the probablty of error. Addtonal references on covert tmng channels can be found n [8. A maor threat aganst wreless mult-band covert tmng networks s the ammng based denal of servce (DoS attack. In order to effect such a DoS attack, a malcous attacker acts n two steps. In the frst step, called the sensng step, the attacker senses each band to detect anomales n the tme delays between packets. Upon successful detecton of anomales correspondng to covert communcaton n a spectrum band, the attacker ams the band n the second step called the ammng step. The transmtter and the recever of the covert tmng channel can then swtch the frequency of operaton. The recent developments n cogntve rado enabled dynamc spectrum access (DSA networks [9 enables the mplementaton of such a system. The effectveness can further be enhanced when, n addton to the flexblty provded by DSA, the other nodes n the covert tmng network camouflage the covert tmng communcaton by conductng auxlary communcatons. In order to llustrate ths, we present the results of experments conducted by mplementng a cogntve rado prototype based on a software abstracton layer over off-the-shelf IEEE a/b/g supported by Atheros hardware chp sets. The detals of the test bed mplementaton can be found n [8. To llustrate the dfference between normal data traffc and covert tmng data traffc, we conducted two experments: ( standard FTP communcaton wthout any underlay covert tmng data and ( FTP wth underlay covert tmng traffc. Fg. 1 presents the packet count dstrbuton at varous nter-arrval tme ntervals for a sngle-transmtter-sngle-recever system n the absence of underlay tmng channel. It s observed that the packet count resembles a Gaussan dstrbuton. We then ntroduce the underlay covert tmng communcaton n the testbed and snff the nter-arrval tmng of the packets n the network. In order to effect covert tmng communcaton, packets are transmtted wth two dstnct nter-packet delays. Fg. 2 presents the packet count dstrbuton n the presence of underlay covert tmng communcaton. Two dstnct Gaussan /10/$ IEEE

2 Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE INFOCOM 2010 proceedngs Ths paper was presented as part of the man Techncal Program at IEEE INFOCOM lke dstrbutons are observed. Thus, t s nferred that sensng the nter-arrval tme of the packets n the network can reveal the exstence of a covert tmng channel n the network. Packet count n the network Inter arrval tme of the packets (ms. Fg. 1. Packet count dstrbuton for dfferent nter-packet tme delays n a sngle-transmtter-sngle-recever system wth no underlay covert tmng traffc. Packet count n the network Inter arrval tme of the packets (ms. Fg. 2. Packet count dstrbuton for dfferent nter-packet tme delays n a sngle-transmtter-sngle-recever system wth underlay covert tmng traffc. We then deploy multple transmtters and recevers communcatng n separate spectrum bands (e.g., for the llustraton consdered here, we use GHz and 5.28 GHz bands. One of the transmt-receve pars share a covert tmng channel and the other communcatons are auxlary communcatons to camouflage the tmng channel. Fg. 3 presents the dstrbuton of the packet count when 5 camouflagng auxlary communcatons are deployed. It s observed that the dstrbuton s smlar to the case when no underlay covert tmng channel s present. Thus, t s dffcult for the attacker to detect the presence of tmng anomales when the covert tmng channel s camouflaged by auxlary communcatons. Sarkar et al [10 presented an nformaton concealng game to model ammng n mult-band networks, when the attacker has more nformaton about the spectrum bands than the Observed Packet count by the attacker Inter arrval tme of the packets (ms. Fg. 3. Packet count dstrbuton for dfferent nter-packet tme delays as observed by an attacker n a sensng wndow of 1 second n the presence of 5 auxlary communcatons. defendng nodes. The defendng nodes dd not have a means of preventng the attacker from learnng about the network. In mult-band covert tmng networks consdered here, the tactcal covert network and the attacker have the same nformaton about the spectrum bands. Moreover, the covert tmng network can deploy camouflagng resources to prevent the covert communcaton from beng detected by the attacker. In [8, we studed the DoS n DSA based mult-band covert tmng networks wth a sngle pont of attack. The attacker senses the spectrum bands and the covert tmng network deploys camouflagng resources n the form of auxlary communcatons n the dfferent spectrum bands. After sensng the spectrum bands, the attacker attacks at most one of the spectrum bands by transmttng spurous sgnals. Ths attack-defense scenaro was modeled as a two-ter game namely sensng and ammng game. In ths paper, we present the more generalzed mult-pont attack scenaro. We extend our model n [8 to study the problem n whch an attacker can am multple spectrum bands n the system. We determne the Nash equlbrums of the sensng and ammng games. In the sensng game, the Nash equlbrum s the optmal allocaton of the attacker s sensng resources and the covert tmng network s camouflagng resources n each spectrum band. In the ammng game the Nash equlbrum s the optmal transmt power used by the attacker on each spectrum band and the optmal probablty of attackng each spectrum band. We compare the performance of the proposed game theoretc approach wth that of other well known heurstcs to demonstrate the effectveness of the proposed mechansm. Whle the analyss presented n ths paper s vald for any system usng multple spectrum bands, t s partcularly applcable to DSA networks. Ths s because n most networks usng multple spectrum bands, there are network specfc polces and polcng mechansms that prevent the knd of attacks dscussed n ths paper. However, the flexblty provded by DSA (n admttng users from dfferent heterogeneous

3 Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE INFOCOM 2010 proceedngs Ths paper was presented as part of the man Techncal Program at IEEE INFOCOM networks nherently prevents the use of network specfc polces and hence makes DoS attacks as those dscussed n ths paper, easer to effect. The rest of the paper s organzed as follows. The system model s presented n Secton II. We descrbe the game theoretc model and the related analyss n Secton III. The numercal results are presented n Secton IV. Conclusons are drawn n Secton V. II. SYSTEM MODEL Consder a covert tmng workng on a set of N bands, specfed by N ={1, 2,,N}. A malcous agent or an attacker senses some or all of the N spectrum bands and decdes to attack a subset A of sze Ŝ S N bands, specfed by A ={ 1, 2,,Ŝ} N. S refers to the maxmum number of bands that the attacker can attack. Each spectrum band has a utlty assocated wth t, whch ndcates the crtcal nature of the covert tmng communcaton n the band. The network deploys camouflagng resources n some or all of the spectrum bands to protect the underlay covert tmng communcaton n the band. The camouflagng resources could be the amount of tme the covert tmng network uses auxlary communcatons n a frame. Alternatvely, the camouflagng resources could also be the number of auxlary communcatons assstng the covert communcaton. Thus, the network can deploy only a fnte amount of camouflagng resources. The attacker frst senses a subset of the N spectrum bands n order to detect the presence of nformaton. In order to sense the spectrum band, the attacker deploys sensng resources. The sensng resources could be the number of tme slots the attacker would spend sensng each spectrum band n a frame and hence, the total sensng resources avalable to the attacker s fnte. Upon sensng the bands, the attacker determnes the subset A of bands whch t shall attack. The attacker also determnes the optmal power t needs to spend on each band n A n order to successfully launch an attack. We model the above scenaro as a two-ter game. In the frst ter of the game (called the sensng game, the obectve s to determne the sensng resource the attacker deploys n each spectrum band and the camouflagng/protectve resource the covert tmng network deploys on each band. Ths s done by modelng the sensng game as a zero sum game played by the covert tmng network and the attacker. In the second ter of the game (called the ammng game, the obectve s to determne the optmal transmt powers the attacker uses on each spectrum band t decdes to attack. It s also essental to determne the optmal probabltes wth whch the attacker chooses to attack each spectrum band. In order to determne the optmal transmt powers and attack probabltes on each band, the ammng game s modeled as a non-zero sum game where the attacker acts as vrtual players (one correspondng to each spectrum band n the set A. The sensng and ammng stages are decoupled n the analyss. Ths s because, wreless devces operate n halfduplex mode,.e., at any nstant of tme, wreless devces can act as transmtters or recevers but cannot transmt as well as receve at the same tme. Therefore, the malcous attacker, whch s a wreless node, can act as a recever to perform the sensng or act as a transmtter to effect ammng on a spectrum band. Thus, n practce, t would not be possble to couple the sensng and the ammng stages. However, t s of nterest to provde a two-ter game framework to model the nter-play between the two stages. We make the followng assumptons to carry out the game theoretc analyss. The network deploys camouflagng resource M n the th spectrum band, 1 N. The total camouflagng resources avalable to the network s M. The attacker deploys sensng resource s on spectrum band,. The total sensng resources that can be deployed by the attacker s s III. GAME THEORETIC ANALYSIS The covert tmng network deploys camouflagng resource, M, n band and the attacker deploys sensng resource, s, n band. After successful sensng, the attacker attacks band wth probablty, π and power, P. We descrbe the sensng game n Secton III-A and the ammng game n Secton III-B. A. Sensng Game The th spectrum band has an assocated utlty, U, whch denotes the crtcal nature of the covert tmng data transmtted n the th band. As an example, f there s covert communcaton on band, then U can be wrtten as [4 ( ( H(q 0 H(q 1 q U = f ln q (1 q 0H(q 1 q 1 H(q 0, (1 q 1 + q 0 1 where H(x s the entropy of the output of a bnary symmetrc channel (BSC wth bt error rate (BER, x, f(α s an ncreasng, concave functon of α, q 0 s the probablty that the th transmtted bt s receved as a one when a zero s transmtted and q 1 s the probablty that the th transmtted bt s receved as a zero when a one s transmtted. The probablty of successful detecton of the covert communcaton n band depends on the sensng resource, s, deployed by the attacker and the camouflagng resource, M, deployed by the covert tmng network. In order to model the nter-play between s, M and p, we use the dose-responsemmunty model [11 whch s explaned as follows. Let the ablty of a drug to destroy a dsease be X 1 and let X 2 denote the mmunty parameter of the subect to the drug. Let the event Y =0denote the survval of a subect when a drug s used on the subect and let the event Y =1denote the death. Let X = [ X 1 X 2 T.Letβ = [ β1 β 2 T be the vector of regresson parameters. The negatve sgn for β 2 ndcates that the dose and the mmunty act aganst each other. If Pr{Y =1} = p =1 Pr{Y =0}, then, accordng

4 Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE INFOCOM 2010 proceedngs Ths paper was presented as part of the man Techncal Program at IEEE INFOCOM to the dose-response-mmunty model, p logt(p =ln = β T X. (2 1 p In the sensng game, the sensng resources are analogous to the dose of the drug and the camouflagng resources are analogous to the mmunty. The event Y = 1 (death of the subect n the dose-response-mmunty model models the successful detecton of covert communcaton and Y = 0 (. e., survval of the subect models the falure of the attacker to detect the covert communcaton n the band. Then, X = [ ln(s ln(m T. Hence, from the dose-responsemmunty model the probablty of successfully detectng the communcaton n band, p, can be obtaned from (2 as p =. (3 The probablty p should satsfy the followng propertes 1 When the attacker deploys no sensng resources n a spectrum band, t wll be unable to detect the covert communcaton n the band. Thus, s =0should result n p =0. 2 When the covert tmng network deploys no camouflagng resources n a band, the attacker wll be able to detect the presence of covert communcaton wth probablty 1. Thus M =0should result n p =1. The expresson for p n (3 satsfes the propertes mentoned above. As an example, let the attacker perform the sensng accordng to a Posson process, X 1, of rate, s, n the spectrum band. Smlarly, let the network deploy auxlary communnncatons at a tme X 2, whch s exponentally dstrbuted wth rate M. The attacker detects the covert communcaton successfully f the covert network deploys camouflagng resources after the attacker begns to sense. Thus, the sensng resource and camouflagng resources used n a band are the rate at whch the attacker senses the band and that at whch the network defends the band, respectvely. Then the probablty that the attacker successfully detects the covert communcaton n band, p,sp =Pr{X 1 <X 2 } = s s +M, whch can be obtaned from (3 when β 1 = β 2 =1. In general, the values β 1 and β 2 n (3 denote the attacker s anomaly detecton capablty and the covert tmng network s camouflagng capablty, respectvely. If the attacker uses more accurate detectng mechansms, t results n a larger β 1. Smlarly, a covert tmng network wth better strateges for auxlary communcatons represents a hgher value of β 2. The scenaro β 1 > β 2 represents a relatvely less effectve camouflagng capablty of the covert tmng network compared to the accuracy of the attacker n detectng the tmng anomales. β 1 = β 2 represents equal ablty for the attacker and the camouflagng network. The net utlty obtaned by the attacker by sensng band, whch s also the net mpact experenced by the covert tmng network f the attacker attacks band, E, can be wrtten as E = U p = U. (4 The expected mpact on the covert tmng network can then be wrtten as E = E = U. (5 A A The [ strategy for the covert tmng network s the vector, M = T M1 M 2 M 3 M N and that for the attacker s the vector, s = [ T s 1 s 2 s 3 s N. Note that the values of s are zero for / A. The optmal strategy of the attacker s the vector s that solves the optmzaton problem U, (6 max s,a N A subect to the constrants s s. (7 N The utlty for the covert tmng network s the negatve of that of the attacker because the covert tmng network loses n the form of mpact, whatever the attacker gans as utlty by ammng band. Thus, the optmal strategy for the covert tmng network can be determned by solvng the optmzaton problem max U, (8 mn M s,a N A subect to the constrants, M M. (9 Lemma 3.1: The attacker obtans maxmum utlty only when t uses all the sensng resources,. e., constrant (7 s met wth equalty. Proof: Consder a strategy s = [ s 1 s 2 s 3 s N, where for any chosen subset A Nof sze S, s = A s < s. Letφ = s s. Note that φ>0. Let the utlty obtaned by the attacker under strategy s be Ũ. Consder the strategy ŝ = [ ŝ 1 ŝ 2 ŝ 3 ŝ N, where, for any subset A N of sze S, ŝ = s + φ S, A. Note that A ŝ = s and ŝ > s, and hence, ( U A ŝ β1 ŝ β1 > ( U A Thus, s s a sub-optmal strategy..

5 Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE INFOCOM 2010 proceedngs Ths paper was presented as part of the man Techncal Program at IEEE INFOCOM Theorem 3.1: If  N such that Â, E > k A U k 1, A = N\Â, A S, then the attacker s optmal strategy s s k =0, k A. [ Proof: Let the attacker deploy a strategy s = T s1 s 2 s 3 s N where sk > 0, k A. Let s = k A s k. The utlty obtaned by the attacker under ths strategy s Ũ =   Ẽ + k A Ẽ k Ẽ + k A U k. (10 Consder the strategy, ŝ = [ T ŝ 1 ŝ 2 ŝ 3 ŝ N where ŝ k =0 k A for some Â, ŝ = s + s and Â,, ŝ = s. Thus the attacker deploys all ts sensng resources and hence, obeys Lemma 3.1. Let the mpact on band accordng to ths strategy be Ê. Note that Ê = Ẽ, Â, and Ê > Ẽ. The utlty obtaned by the attacker for ths strategy s Û = Â Ê + E >  Ẽ + k A U k (11 > Ũ. In the above, the second step follows from the hypothess whle the thrd follows from (10. Thus s s a sub-optmal strategy for the attacker. A Each spectrum band n  specfed n Theorem 3.1 represents a spectrum band whose mpact s much larger than the sum of the utltes of another set of bands. Thus, the set of bands n  denote a set of bands wth hghly crtcal covert communcaton. These bands thus form the crtcal bands of the covert tmng network. Theorem 3.1 then sgnfes the fact that the attacker perceves more benefts by deployng all ts sensng resources on crtcal spectrum bands nstead of dstrbutng them over all the bands. Followng the argument provded n the proof of Lemma 3.1, the followng lemma can be obtaned. Lemma 3.2: The covert tmng network perceves mnmum mpact only when t deploys all ts camouflagng resources,. e., constrant (9 s met wth equalty. [ Proof: Consder a strategy M = M 1 M2 M3 M N, where for any chosen subset M = M <s.letχ = M M. Note that χ>0. Let the utlty obtaned by the attacker under strategy M be Ũ. Consder the strategy ˆM = [ ˆM1 ˆM2 ˆM3 ˆM N, where, ˆM = M + χ N. Note that ˆM = M and ˆM > M, and hence, max U < max U s β2. + ˆM s β2 + M A 1 It s noted that t s possble that the set A s empty. In ths case, s > 0,. Thus, M s a sub-optmal strategy for the network. Theorem 3.2: Let  and A be as defned n Theorem 3.1. Then, the optmal strategy for the covert tmng network results n M k =0 k A. Proof: : The proof follows by applyng Lemma 3.2 and s dentcal to the proof of Lemma 1 n [8. Theorem 3.2 mples that the network must also deploy camouflagng resources only on the crtcal spectrum bands. After dentfyng the set of bands that need to be camouflaged by the covert tmng network and sensed by the attacker, t s essental to determne the optmal allocaton of the sensng and camouflagng resources among the bands n the set Â. Theorem 3.3 below provdes the relaton between the sensng and ammng resource deployed n each band n Â. Theorem 3.3: The equlbrum for the zero-sum sensng game occurs when s M = s M, Â. Proof: Let the equlbrum strateges be s =[s  and M =[M  for the attacker and the network, respectvely. Thus s s a soluton to the optmzaton problem (6 subect to the constrants (7 wth M = M. Smlarly, M s a soluton to the optmzaton problem (8 subect to the constrants (9 wth s = s. From Lemmas 3.1 and 3.2, constrants (7 and (9 are met wth equalty. Thus, wrtng the Lagrangan for the equalty constraned optmzaton problem specfed by (6 and (7 and applyng the frst order necessary condtons, we obtan ( 2 = M β2 M β2 1 sβ1 1, (12, Â. Smlarly, wrtng the Lagrangan for the equalty constraned optmzaton problem specfed by (8 and (9 and applyng the frst order necessary condtons, (, Â. From (12 and (13, 2 = M β2 1 M β2 1, (13 s M = s M, (14, Â. Applyng the constrants (7 and (9 and Lemmas s 3.1 and 3.2 to (14, M = s M, Â. Theorem 3.3 provdes a means for adustng the sensng and camouflagng resources accordng to the varyng utltes. In other words, f the utlty of a partcular band changes, then the sensng and camouflagng resources for that band are both scaled by the same factor to obtan a new equlbrum pont.

6 Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE INFOCOM 2010 proceedngs Ths paper was presented as part of the man Techncal Program at IEEE INFOCOM B. Jammng Game After sensng the spectrum bands and formng the subset  of bands whch the attacker decdes to attack, the obectve of the ammng game s to determne the optmal transmt powers on each spectrum band n order to successfully am the band. In order to formulate the ammng game, we lst the followng detals whch we consder about the system, n addton to those mentoned n Secton II. The attacker attacks band wth probablty π and transmt power, P. The attacker can spend a total power, P tot, n order to attack the spectrum bands. In the th spectrum band, there s one ntended and n 1 camouflagng transmtters correspondng [ to a recever. The channel gan vector h = T h1 h 2 h 3 h n, where h1 denotes the gan from the ntended transmtter and h 2...h n denote the gan from the camouflagng transmtters. The gan from the attacker to the recever s ĥ1. The channel nose s addtve whte Gaussan nose (AWGN wth nose power, W. The ntended transmtter on the th band transmts wth power e 1 and the camouflagng transmtters transmt wth powers, e 2, e 3,..., e n. The SIR on the th band perceved at the recever of the covert tmng communcaton due to the ntended transmtter of the covert tmng communcaton s τ and that at the recever of the covert tmng communcaton due to the attacker s transmsson s γ. Successful ammng takes place when the attacker transmts at power P on band such that t results n γ >τ [12. From the defnton of SIR n wreless networks [13, τ and γ can be wrtten as e 1 h 1 τ = W + 1 e (15 h P ĥ 1 γ = W + 1 e. (16 h The ammng problem can be formulated as a non-cooperatve game between S vrtual players. The strategy chosen by each player s the power transmtted and the probablty of attack on each band. It s essental to defne a utlty functon whch should be an ncreasng concave functon of the strategy [14. In order to lmt the transmt power appled by the attacker on each band, we also propose a penalty functon whch s an ncreasng functon of the transmt power and the probablty of attackng the band. Wth all these consderatons, we defne the followng net utlty functon, U net,nthe th band to be U net = a ln(1 + π E +λu(γ τ ln(γ τ μp π, (17 where E s gven by (4, u(y s the modfed unt step functon,. e., u(y = { 1 y>0 0 y 0, (18 a>0and λ>0are utlty parameters and μ>0s the prcng parameter. The expresson for the net utlty, U net n (17 s derved based on the followng consderatons. 1 The attacker can am band successfully only when γ > τ. 2 The attacker should obtan larger utlty when the SIR, γ s greater than τ by a larger margn,. e., the nformaton receved from the attacker s much larger than that receved from the transmtter. 3 The utlty should ncrease when the mpact created on the network ncreases and when the probablty of attackng the crtcal band s larger. 4 The penalty for transmttng hgher power should be more and that for attackng a band wth hgher probablty should be more. It s noted that the magntude of λ should be very small. Ths s to assure that the attacker does not have much ncentve n transmttng exorbtantly large power. Also, the magntude of μ should be very large so that the penalty for transmttng larger powers s large. Wth the above consderatons, the Nash equlbrum strategy for the ammng game can be obtaned as the soluton to the followng optmzaton problem max U net = max a ln(1 + π E + P,π P,π   λu(γ τ ln(γ τ μp π, (19 subect to the constrants P P tot, (20 and  π 1 (21  P 0 π 0. (22 In (19, P =[P  and π =[π Â. The followng theorem provdes a suffcent condton for exstence of a Nash equlbrum for the ammng game specfed by the optmzaton problem (19 subect to the constrants (20-(22. Theorem 3.4: Let ɛ = γ τ and ˆμ max = mn  ( ( λa τ ɛ e 1 ( E 1+E. (23 If μ<ˆμ max, then a unque Nash equlbrum exsts for the ammng game specfed by the optmzaton problem (19. Proof: The obectve functon for the ammng game s specfed by (17. The Hessan matrx for each term n the obectve functon, H, s gven by H = 2 U net P 2 2 U net P π, (24 U net 2 U net π P 2 U net π 2

7 Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE INFOCOM 2010 proceedngs Ths paper was presented as part of the man Techncal Program at IEEE INFOCOM whch, from (17, can be obtaned as 2 H = λ γ (γ τ 2 P μ. (25 μ ae2 (1+π E 2 From the above, the determnant of the Hessan matrx can be wrtten as 2 [ 2 λa τ E det(h = μ 2, (26 e 1 1+π E ɛ 2 whch s postve f μ<ˆμ max specfed n (23. Note from (25 that the trace of H s negatve. Thus, when μ<ˆμ max, the Hessan matrx H s negatve defnte, and hence U net (and, n turn,  U net s a concave functon. Hence, the optmzaton problem specfed by (19 has a unque Nash equlbrum [14. Corollary 3.1: When ɛ 0,, the ammng game has a unque Nash equlbrum. Proof: When ɛ 0, ˆμ max and the condton μ<ˆμ max n Theorem 3.4 s satsfed. Ths results n a unque Nash equlbrum. Although the condton n Theorem 3.4 provdes an upper bound on μ to result n a Nash equlbrum, t stll does not ensure that the Nash equlbrum thus determned satsfes the constrants (20-(22. The followng theorem provdes another upper bound and a lower bound on μ that determnes the value of the unque Nash equlbrum that satsfes the constrants (20-(22. Theorem 3.5: Let ɛ = ɛ, and let ɛ 0. Let and aĥ1e μ max = mn (27  e 1 h 1 a  μ mn = 1+  ĥ 1 e 1h 1 1. (28 E Then μ (μ mn,μ max, there exsts a unque Nash equlbrum for the ammng game that satsfes the constrants (20-(22. Proof: The Lagrangan, L, for the constraned optmzaton problem (19 subect to the constrants (20-(22 can be wrtten as 2 L = a ln(1 + π E + λ ln(γ τ + μp π ν 1 (α 2 P + P ν 2 (β 2 1+ π, (29 where ν 1 and ν 2 are the Lagrangan varables correspondng to the constrants and α, β are slack varables to account for the 2 In (29, ndcates Â. We omt ths detal n (29 for smplcty. nequalty n the constrants. Accordng to the Karush-Kuhn- Tucker (KKT condtons [15, t s essental to equate the partal dervatves of L wth respect to P, π, ν 1, ν 2, α and β to zero n order to determne the Nash equlbrum. The condton ɛ = ɛ 0, yelds P = e h 1. (30 ĥ 1 The value of P obtaned above satsfes P > 0 n (22. In order to satsfy (20, only those bands,  are chosen that satsfy e h 1 <P. (31 ĥ 1 In order to maxmze the number of bands that can be attacked and mnmze the total transmt power of the attacker, the attacker chooses the bands wth the smallest vales of eh1 ĥ 1 such that (31 s satsfed. Note that the choce of P that satsfes (31, also satsfes (20 wth nequalty and hence, ν 1 = 0. The condton n Theorem 3.4 results n ν 2 = 0. Thus, equatng the partal dervatve of L wth respect to π to zero, usng the fact that ν 1 = ν 2 =0and usng the expresson for P n (30, we obtan the optmal π as π = aĥ1 1. (32 μe 1 h 1 E When μ < μ max specfed n (27, the constrant π > 0 n (22. The condton μ>μ mn specfed n (28 satsfes the constrant (21. Thus, the Nash equlbrum satsfes the constrants. Remark 1: Snce μ s a parameter that can be modfed accordng to the network, one can choose μ that satsfes the condton provded n Theorem 3.5, and thus, obtan a unque Nash equlbrum for the ammng game. Remark 2: Note that, n order to apply Theorem 3.5, t s essental that for the chosen set of bands  such that μ max n (27> μ mn n (28. It s observed that ths s satsfed f only one band s chosen. However, when multple bands are chosen, t may not be true n general. Then, among the subset of bands chosen to determne the optmal P, a smaller subset s chosen whch satsfes μ mn < μ max. Ths gves a means to determne the maxmum number of spectrum bands that can be attacked. Remark 3: Note that π ncreases when ĥ1 h 1 ncreases and e 1 and E are fxed. Ths means that the attacker s more lkely to attack the band n whch t s closer to the recever, than the ntended transmtter. Remark 4: From (30 and (32, t s observed that for two bands wth the same mpact (E, the attacker s more lkely to attack the band n whch t has to use lesser power. Remark 5: From (32, t s also observed that between two bands on whch the attacker requres the same transmt power, t s more lkely to attack the one n whch t can create more mpact.

8 Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE INFOCOM 2010 proceedngs Ths paper was presented as part of the man Techncal Program at IEEE INFOCOM IV. RESULTS AND DISCUSSION We present the numercal results n two parts. The results for the sensng game are frst presented n Secton IV-A. Later, Secton IV-B present the results for the ammng game. We consder the followng numercal values n the computatons. The network has N =25spectrum bands [8 and the attacker can attack at most S =10spectrum bands. The utlty on each band s taken to be unformly dstrbuted n the nterval [100, 500. A. Sensng Game As mentoned n Secton III-A, we apply the dose-responsemmunty model to obtan the probablty of successfully detectng the covert communcaton n a spectrum band. We consder equally capable sensng and camouflagng abltes for the attacker and the covert tmng network, respectvely,. e., β 1 = β 2. For the numercal computatons, we consder β 1 = β 2 =1. Fg. 4 presents the expected mpact on the covert tmng network wth respect to the total avalable sensng resources, s, form = 150. In order to compare the proposed game theoretc allocaton of the sensng and camouflagng resources, we consder two well known schemes- ( the equal allocaton scheme where the sensng and camouflagng resources are equally dvded among all channels and ( the adaptve proportonal scheme where sensng and camouflagng resources are allocated to the th band accordng to the rato, U. U k k From Fg. 4, t s observed that the proposed game theoretc scheme results n lesser average mpact on the covert network than the adaptve proportonal and the unform allocaton schemes. As an example, for s = 100, the expected mpact on the covert tmng network caused by the proposed scheme s about 1500 whle that caused by the adaptve proportonal allocaton scheme s about 2000 and that caused by the unform allocaton scheme s about Thus, an mprovement of about 25% s acheved over the adaptve proportonal allocaton scheme and an mprovement of about 37.5% s acheved over the unform allocaton scheme. Smlar mprovements can be observed n Fg. 5, whch depcts the results when the total sensng resources, s = 150, and the total camouflagng resources, M, s vared. B. Jammng Game In order to perform the numercal computatons for the ammng game, we generate the channel gan vector, h and the channel gan ĥ1 from the attacker, usng the Jake s propagaton model [16. We run Lnux based smulaton experments and present the results averaged over these smulaton experments. Fg. 6 presents the average transmt power for the attacker for varyng values of the total sensng resources, s, wth M = 150. As n the sensng game, the performance s compared wth that of the adaptve proportonal and the equal resource allocaton schemes. It s observed that the average transmt power requred by the attacker to successfully am the covert tmng network s larger for the proposed game theoretc scheme than that for the adaptve Impact on the Tactcal Network, Σ E Proposed Adaptve Proportonal Unform Total Sensng Resources, s Fg. 4. Expected mpact on the covert tmng network when M = 150 and the utltes are unformly dstrbuted n [100, 500. Impact on the Tactcal Network, Σ E Proposed Adaptve Proportonal Unform Total Camouflagng Resources, M Fg. 5. Expected mpact on the covert tmng network when the s = 150 and the utltes are unformly dstrbuted n [100, 500. proportonal and the equal resource allocaton schemes. As an example, for s = 100, the proposed game theoretc scheme requres the attacker to transmt at an average power of about dbm whle the adaptve proportonal scheme results n about dbm and the equal allocaton scheme results n about -20 dbm. Thus the proposed scheme results n about 20% more average power than that of the adaptve proportonal scheme and about 30% addtonal power compared to the equal allocaton scheme. Ths s because, the condtons requred for μ mn <μ max (mentoned n remark 1 n Secton III-B s satsfed for fewer channels n the adaptve proportonal and the equal allocaton schemes thus reducng the values of π and hence, the average power, P π. Thus, the proposed scheme not only reduces the mpact on the covert tmng network but also forces the attacker to use larger average transmt powers. Smlar results can be observed for varyng M n Fg. 7. From Fgs. 6 and 7, t s observed that the average transmt power decreases wth ncreasng values of the total sensng resources, s, and ncreases wth ncreasng values of the total

9 Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE INFOCOM 2010 proceedngs Ths paper was presented as part of the man Techncal Program at IEEE INFOCOM camouflagng resources, M. Ths s because, when s ncreases, the mpact on the covert tmng covert network ncreases. From (27, μ max ncreases. Ths allows larger values of the prcng parameter, μ, whch, n turn, forces the attacker to transmt at lower average powers. Smlarly, ncreasng the value of M reduces the mpact on the covert tmng network on each spectrum band, thus reducng μ max allowng smaller values of μ. Ths, n turn, results n larger average transmt power for the attacker. Average Transmt Power (dbm Proposed Adaptve Proportonal Unform Total Sensng resources, s Fg. 6. Average transmt power for the attacker when M = 150 and the utltes are unformly dstrbuted n [100, 500. Average Transmt power (dbm Proposed Adaptve Proportonal Unform Total Camouflagng Resources, M Fg. 7. Average transmt power for the attacker when s = 150 and the utltes are unformly dstrbuted n [100, 500. V. CONCLUSION We presented a two ter adversaral game theoretc approach to study malcous nterference based DoS attacks n multband covert tmng networks. Nash equlbrum strateges were obtaned for both the terss of the game. The followng key nferences are drawn from the analyss presented n ths paper. The attacker needs to deploy all ts sensng resources only on the crtcal bands. The covert tmng network needs to deploy all ts camouflagng resources only on the crtcal bands. At the equlbrum pont, the ratos between the sensng and the camouflagng resources deployed n all the crtcal bands are equal. Between two bands wth equal mpact, the attacker s more lkely to attack the band n whch t s requred to transmt at lesser power. Between two bands n whch t has to transmt equal power, the attacker s more lkely to attack the band whch perceves hgher mpact. The proposed game theoretc scheme can result n about 25-40% reduced mpact on the covert tmng network when compared to other well known heurstcs. The proposed game theoretc scheme results n about 20-30% ncreased transmt power for the attacker when compared to other well known heurstc schemes. VI. ACKNOWLEDGEMENT Ths research was partally funded by NSF # and NSF # and partally funded by NJ-IJ. REFERENCES [1 B. W. Lampson, A note on the confnement problem, ACM Commun., [2 K. W. Eggers and P. W. Mallett, Characterzng network covert storage channels, Fourth Aerospace Comp. Securty Appl. Conf., Dec [3 K. G. Lee, A. Savold, P. Guban, K. S. Lm, and S. Lee, Methodologes for detectng covert database, Intl. Conf. on Intellgent Info. Hdng and Multmeda Sgnal Proc., Aug [4 I. S. Morskowtz and A. R. Mller, Smple tmng channels, Proc. IEEE Comp. Soc. Symposum on Research n Securty and Prvacy, [5 Z. Wang and R. B. Lee, Capacty estmaton of non-synchronous covert channels, 25th IEEE Intl. Conf. on Dstrbuted Computng Systems Workshops, Jun [6 V. Anantharam and S. Verdu, Bts through queues, IEEE Trans. on Info. Theory, vol. 42, no. 1, pp. 4 18, Jan [7 A. B. Wagner and V. Anantharam, Zero-rate relablty of the exponental-server tmng channel, IEEE Trans. on Info. Theory, vol. 51, no. 2, pp , Mar [8 S. Sengupta, S. Anand, K. Hong, and R. Chandramoul, On adversaral games n dynamc spectrum access based tmng covert channels, ACM Moble Computng and Communcatons Revew: Specal Issue on Cogntve Rado Technologes and Systems, vol. 13, no. 2, pp , Apr [9 M. Buddhkot, P. Kolodzy, S. Mller, K. Ryan, and J. Evans, Dmsumnet: New drectons n wreless networkng usng coordnated dynamc spectrum access, IEEE Intl. Symposum on a World of Wreless, Moble and Multmeda Networks (WoWMoM 2005, Nov [10 S. Sarkar, E. Altman, R. El-Azouz, and Y. Hayel, Informaton concealng games, Proc., IEEE Intl. Conf. on Computer Commun. (INFOCOM 2008 mn-conference, Mar [11 S. C. Chow, Encyclopeda of Bopharmaceutcal Statstcs. Informa Health Care, 2 nd Edton, [12 T. Basar, The Gaussan test channel wth an ntellgent ammer, IEEE Trans. on Info. Theory, vol. 29, no. 1, pp , Jan [13 A. J. Vterb, CDMA: Prncples of Spread Spectrum Communcaton. Addson-Wesley, [14 D. Fudenberg and J. Trole, Game Theory. MIT Press, [15 D. G. Luenberger, Lnear and Non-lnear Programmng. Kluwer Academc Publshers, [16 T. S. Rappaport, Wreless Communcatons: Prncples and Practce. Prentce Hall Inc., New Jersey, 1996.

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

Define Y = # of mobiles from M total mobiles that have an adequate link. Measure of average portion of mobiles allocated a link of adequate quality.

Define Y = # of mobiles from M total mobiles that have an adequate link. Measure of average portion of mobiles allocated a link of adequate quality. Wreless Communcatons Technologes 6::559 (Advanced Topcs n Communcatons) Lecture 5 (Aprl th ) and Lecture 6 (May st ) Instructor: Professor Narayan Mandayam Summarzed by: Steve Leung (leungs@ece.rutgers.edu)

More information

Resource Control for Elastic Traffic in CDMA Networks

Resource Control for Elastic Traffic in CDMA Networks Resource Control for Elastc Traffc n CDMA Networks Vaslos A. Srs Insttute of Computer Scence, FORTH Crete, Greece vsrs@cs.forth.gr ACM MobCom 2002 Sep. 23-28, 2002, Atlanta, U.S.A. Funded n part by BTexact

More information

Traffic balancing over licensed and unlicensed bands in heterogeneous networks

Traffic balancing over licensed and unlicensed bands in heterogeneous networks Correspondence letter Traffc balancng over lcensed and unlcensed bands n heterogeneous networks LI Zhen, CUI Qme, CUI Zhyan, ZHENG We Natonal Engneerng Laboratory for Moble Network Securty, Bejng Unversty

More information

Multiband Jamming Strategies with Minimum Rate Constraints

Multiband Jamming Strategies with Minimum Rate Constraints Multband Jammng Strateges wth Mnmum Rate Constrants Karm Banawan, Sennur Ulukus, Peng Wang, and Bran Henz Department of Electrcal and Computer Engneerng, Unversty of Maryland, College Park, MD 7 US Army

More information

Approximating User Distributions in WCDMA Networks Using 2-D Gaussian

Approximating User Distributions in WCDMA Networks Using 2-D Gaussian CCCT 05: INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS, AND CONTROL TECHNOLOGIES 1 Approxmatng User Dstrbutons n CDMA Networks Usng 2-D Gaussan Son NGUYEN and Robert AKL Department of Computer

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

Distributed Uplink Scheduling in EV-DO Rev. A Networks

Distributed Uplink Scheduling in EV-DO Rev. A Networks Dstrbuted Uplnk Schedulng n EV-DO ev. A Networks Ashwn Srdharan (Sprnt Nextel) amesh Subbaraman, och Guérn (ESE, Unversty of Pennsylvana) Overvew of Problem Most modern wreless systems Delver hgh performance

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

Impact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas

Impact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas Impact of Interference Model on Capacty n CDMA Cellular Networks Robert Akl, D.Sc. Asad Parvez Unversty of North Texas Outlne Introducton to CDMA networks Average nterference model Actual nterference model

More information

RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING

RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING Vaslos A. Srs Insttute of Computer Scence (ICS), FORTH and Department of Computer Scence, Unversty of Crete P.O. Box 385, GR 7 Heraklon, Crete,

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

Topology Control for C-RAN Architecture Based on Complex Network

Topology Control for C-RAN Architecture Based on Complex Network Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks I. J. Communcatons, etwork and System Scences, 8, 3, 7-83 Publshed Onlne August 8 n ScRes (http://www.scrp.org/journal/jcns/). Jont Adaptve Modulaton and Power Allocaton n Cogntve Rado etworks Dong LI,

More information

CDMA Uplink Power Control as a Noncooperative Game

CDMA Uplink Power Control as a Noncooperative Game Wreless Networks 8, 659 670, 2002 2002 Kluwer Academc Publshers. Manufactured n The Netherlands. CDMA Uplnk Power Control as a Noncooperatve Game TANSU APCAN, TAMER BAŞAR and R. SRIKANT Coordnated Scence

More information

Full-duplex Relaying for D2D Communication in mmwave based 5G Networks

Full-duplex Relaying for D2D Communication in mmwave based 5G Networks Full-duplex Relayng for D2D Communcaton n mmwave based 5G Networks Boang Ma Hamed Shah-Mansour Member IEEE and Vncent W.S. Wong Fellow IEEE Abstract Devce-to-devce D2D communcaton whch can offload data

More information

Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications over Cognitive Radio Networks

Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications over Cognitive Radio Networks 1 Queung-Based Dynamc Channel Selecton for Heterogeneous ultmeda Applcatons over Cogntve Rado Networks Hsen-Po Shang and haela van der Schaar Department of Electrcal Engneerng (EE), Unversty of Calforna

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson 37th CDC, Tampa, December 1998 Analyss of Delays n Synchronous and Asynchronous Control Loops Bj rn Wttenmark, Ben Bastan, and Johan Nlsson emal: bjorn@control.lth.se, ben@control.lth.se, and johan@control.lth.se

More information

Distributed Resource Allocation and Scheduling in OFDMA Wireless Networks

Distributed Resource Allocation and Scheduling in OFDMA Wireless Networks Southern Illnos Unversty Carbondale OpenSIUC Conference Proceedngs Department of Electrcal and Computer Engneerng 11-2006 Dstrbuted Resource Allocaton and Schedulng n OFDMA Wreless Networks Xangpng Qn

More information

Power Allocation in Wireless Relay Networks: A Geometric Programming-Based Approach

Power Allocation in Wireless Relay Networks: A Geometric Programming-Based Approach ower Allocaton n Wreless Relay Networks: A Geometrc rogrammng-based Approach Khoa T. han, Tho Le-Ngoc, Sergy A. Vorobyov, and Chntha Telambura Department of Electrcal and Computer Engneerng, Unversty of

More information

Ergodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power

Ergodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power 7th European Sgnal Processng Conference EUSIPCO 29 Glasgow, Scotland, August 24-28, 29 Ergodc Capacty of Block-Fadng Gaussan Broadcast and Mult-access Channels for Sngle-User-Selecton and Constant-Power

More information

Power Control for Wireless Data

Power Control for Wireless Data Power Control for Wreless Data Davd Goodman Narayan Mandayam Electrcal Engneerng WINLAB Polytechnc Unversty Rutgers Unversty 6 Metrotech Center 73 Brett Road Brooklyn, NY, 11201, USA Pscataway, NJ 08854

More information

Selective Sensing and Transmission for Multi-Channel Cognitive Radio Networks

Selective Sensing and Transmission for Multi-Channel Cognitive Radio Networks IEEE INFOCOM 2 Workshop On Cogntve & Cooperatve Networks Selectve Sensng and Transmsson for Mult-Channel Cogntve Rado Networks You Xu, Yunzhou L, Yfe Zhao, Hongxng Zou and Athanasos V. Vaslakos Insttute

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. The Impact of Spectrum Sensng Frequency and Pacet- Loadng

More information

Distributed Channel Allocation Algorithm with Power Control

Distributed Channel Allocation Algorithm with Power Control Dstrbuted Channel Allocaton Algorthm wth Power Control Shaoj N Helsnk Unversty of Technology, Insttute of Rado Communcatons, Communcatons Laboratory, Otakaar 5, 0150 Espoo, Fnland. E-mal: n@tltu.hut.f

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

Clustering Based Fractional Frequency Reuse and Fair Resource Allocation in Multi-cell Networks

Clustering Based Fractional Frequency Reuse and Fair Resource Allocation in Multi-cell Networks Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the IEEE ICC 21 proceedngs Clusterng Based Fractonal Frequency Reuse and Far Resource

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

A Recursive Approach to Compute Bit Error Rate in Underwater Channels with Multiple Paths

A Recursive Approach to Compute Bit Error Rate in Underwater Channels with Multiple Paths A Recursve Approach to Compute Bt Error Rate n Underwater Channels wth Multple Paths C. Chen A. Ad Center for Wreless Communcaton and Sgnal Processng Research Dept. of Electrcal and Computer Engneerng

More information

UNIT 11 TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT

UNIT 11 TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT UNIT TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT Structure. Introducton Obectves. Key Terms Used n Game Theory.3 The Maxmn-Mnmax Prncple.4 Summary.5 Solutons/Answers. INTRODUCTION In Game Theory, the word

More information

On Interference Alignment for Multi-hop MIMO Networks

On Interference Alignment for Multi-hop MIMO Networks 013 Proceedngs IEEE INFOCOM On Interference Algnment for Mult-hop MIMO Networks Huacheng Zeng Y Sh Y. Thomas Hou Wenng Lou Sastry Kompella Scott F. Mdkff Vrgna Polytechnc Insttute and State Unversty, USA

More information

Tile Values of Information in Some Nonzero Sum Games

Tile Values of Information in Some Nonzero Sum Games lnt. ournal of Game Theory, Vot. 6, ssue 4, page 221-229. Physca- Verlag, Venna. Tle Values of Informaton n Some Nonzero Sum Games By P. Levne, Pars I ), and ZP, Ponssard, Pars 2 ) Abstract: The paper

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION

A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION Vncent A. Nguyen Peng-Jun Wan Ophr Freder Computer Scence Department Illnos Insttute of Technology Chcago, Illnos vnguyen@t.edu,

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

Analysis of Lifetime of Large Wireless Sensor Networks Based on Multiple Battery Levels

Analysis of Lifetime of Large Wireless Sensor Networks Based on Multiple Battery Levels I. J. Communcatons, Network and System Scences, 008,, 05-06 Publshed Onlne May 008 n ScRes (http://www.srpublshng.org/journal/jcns/). Analyss of Lfetme of Large Wreless Sensor Networks Based on Multple

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

The Stability Region of the Two-User Broadcast Channel

The Stability Region of the Two-User Broadcast Channel The Stablty Regon of the Two-User Broadcast Channel Nkolaos appas *, Maros Kountours, * Department of Scence and Technology, Lnköpng Unversty, Campus Norrköpng, 60 74, Sweden Mathematcal and Algorthmc

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

Iterative Water-filling for Load-balancing in

Iterative Water-filling for Load-balancing in Iteratve Water-fllng for Load-balancng n Wreless LAN or Mcrocellular Networks Jeremy K. Chen Theodore S. Rappaport Gustavo de Vecana Wreless Networkng and Communcatons Group (WNCG), The Unversty of Texas

More information

Power Minimization Under Constant Throughput Constraint in Wireless Networks with Beamforming

Power Minimization Under Constant Throughput Constraint in Wireless Networks with Beamforming Power Mnmzaton Under Constant Throughput Constrant n Wreless etworks wth Beamformng Zhu Han and K.J. Ray Lu, Electrcal and Computer Engneer Department, Unversty of Maryland, College Park. Abstract In mult-access

More information

A Game Theoretic Approach for Distributed Resource Allocation and Orchestration of Softwarized Networks

A Game Theoretic Approach for Distributed Resource Allocation and Orchestration of Softwarized Networks A Game Theoretc Approach for Dstrbuted Resource Allocaton and Orchestraton of Softwarzed Networks Salvatore D Oro, Laura Gallucco, Member, IEEE, Sergo Palazzo, Senor Member, IEEE, Govann Schembra Abstract

More information

Test 2. ECON3161, Game Theory. Tuesday, November 6 th

Test 2. ECON3161, Game Theory. Tuesday, November 6 th Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

Achievable Rate Region of CSMA Schedulers in Wireless Networks with Primary Interference Constraints

Achievable Rate Region of CSMA Schedulers in Wireless Networks with Primary Interference Constraints Achevable Rate Regon of CSMA Schedulers n Wreless Networks wth Prmary Interference Constrants Peter Marbach, Atlla Erylmaz, and Asuman Ozdaglar Abstract We consder Carrer Sense Multple Access (CSMA) schedulers

More information

King s Research Portal

King s Research Portal Kng s Research Portal DOI: 10.1109/TWC.2015.2460254 Document Verson Peer revewed verson Lnk to publcaton record n Kng's Research Portal Ctaton for publshed verson (APA): Shrvanmoghaddam, M., L, Y., Dohler,

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6) Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called

More information

Keywords LTE, Uplink, Power Control, Fractional Power Control.

Keywords LTE, Uplink, Power Control, Fractional Power Control. Volume 3, Issue 6, June 2013 ISSN: 2277 128X Internatonal Journal of Advanced Research n Computer Scence and Software Engneerng Research Paper Avalable onlne at: www.jarcsse.com Uplnk Power Control Schemes

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 12, DECEMBER

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 12, DECEMBER IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 2, DECEMBER 204 695 On Spatal Capacty of Wreless Ad Hoc Networks wth Threshold Based Schedulng Yue Lng Che, Student Member, IEEE, Ru Zhang, Member,

More information

Decomposition Principles and Online Learning in Cross-Layer Optimization for Delay-Sensitive Applications

Decomposition Principles and Online Learning in Cross-Layer Optimization for Delay-Sensitive Applications Techncal Report Decomposton Prncples and Onlne Learnng n Cross-Layer Optmzaton for Delay-Senstve Applcatons Abstract In ths report, we propose a general cross-layer optmzaton framework n whch we explctly

More information

An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks

An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks An Energy Effcent Herarchcal Clusterng Algorthm for Wreless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN, USA {seema,

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

Utility-based Routing

Utility-based Routing Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton

More information

Noisy Channel-Output Feedback Capacity of the Linear Deterministic Interference Channel

Noisy Channel-Output Feedback Capacity of the Linear Deterministic Interference Channel Nosy Channel-Output Feedback Capacty of the Lnear Determnstc Interference Channel Vctor Quntero, Samr M. Perlaza, Jean-Mare Gorce arxv:.4649v6 [cs.it] Jan 6 Abstract In ths paper, the capacty regon of

More information

Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques

Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques Malcous User Detecton n Spectrum Sensng for WRAN Usng Dfferent Outlers Detecton Technques Mansh B Dave #, Mtesh B Nakran #2 Assstant Professor, C. U. Shah College of Engg. & Tech., Wadhwan cty-363030,

More information

Research Article A Utility-Based Rate Allocation of M2M Service in Heterogeneous Wireless Environments

Research Article A Utility-Based Rate Allocation of M2M Service in Heterogeneous Wireless Environments Internatonal Dstrbuted Sensor etworks Volume 3, Artcle ID 3847, 7 pages http://dx.do.org/.55/3/3847 Research Artcle A Utlty-Based Rate Allocaton of MM Servce n Heterogeneous Wreless Envronments Yao Huang,

More information

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent

More information

A Predictive QoS Control Strategy for Wireless Sensor Networks

A Predictive QoS Control Strategy for Wireless Sensor Networks The 1st Worshop on Resource Provsonng and Management n Sensor Networs (RPMSN '5) n conjuncton wth the 2nd IEEE MASS, Washngton, DC, Nov. 25 A Predctve QoS Control Strategy for Wreless Sensor Networs Byu

More information

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research

More information

Energy Efficiency Analysis of a Multichannel Wireless Access Protocol

Energy Efficiency Analysis of a Multichannel Wireless Access Protocol Energy Effcency Analyss of a Multchannel Wreless Access Protocol A. Chockalngam y, Wepng u, Mchele Zorz, and Laurence B. Mlsten Department of Electrcal and Computer Engneerng, Unversty of Calforna, San

More information

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport

More information

arxiv: v1 [cs.it] 30 Sep 2008

arxiv: v1 [cs.it] 30 Sep 2008 A CODED BIT-LOADING LINEAR PRECODED DISCRETE MULTITONE SOLUTION FOR POWER LINE COMMUNICATION Fahad Syed Muhammmad*, Jean-Yves Baudas, Jean-Franços Hélard, and Mattheu Crussère Insttute of Electroncs and

More information

Relevance of Energy Efficiency Gain in Massive MIMO Wireless Network

Relevance of Energy Efficiency Gain in Massive MIMO Wireless Network Relevance of Energy Effcency Gan n Massve MIMO Wreless Network Ahmed Alzahran, Vjey Thayananthan, Muhammad Shuab Quresh Computer Scence Department, Faculty of Computng and Informaton Technology Kng Abdulazz

More information

LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION

LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION Albert M. Chan, Jon Feldman, and Raghu Madyastha (Vanu, Inc., Cambrdge, MA, USA, {chanal,jonfeld,raghu}@vanu.com); Potr Indyk and Davd

More information

Energy-efficient Subcarrier Allocation in SC-FDMA Wireless Networks based on Multilateral Model of Bargaining

Energy-efficient Subcarrier Allocation in SC-FDMA Wireless Networks based on Multilateral Model of Bargaining etworkng 03 569707 Energy-effcent Subcarrer Allocaton n SC-FDMA Wreless etworks based on Multlateral Model of Barganng Ern Elen Tsropoulou Aggelos Kapoukaks and Symeon apavasslou School of Electrcal and

More information

A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS

A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS Pedro Godnho and oana Das Faculdade de Economa and GEMF Unversdade de Combra Av. Das da Slva 65 3004-5

More information

Robust Power and Subcarrier Allocation for OFDM-Based Cognitive Radio Networks Considering Spectrum Sensing Uncertainties

Robust Power and Subcarrier Allocation for OFDM-Based Cognitive Radio Networks Considering Spectrum Sensing Uncertainties 8 H. FATHI, S. M. S. SADOUGH, ROBUST POWER AD SUBCARRIER ALLOCATIO FOR OFDM-BASED COGITIVE RADIO... Robust Power and Subcarrer Allocaton for OFDM-Based Cogntve Rado etworks Consderng Spectrum Sensng Uncertantes

More information

Opportunistic Beamforming for Finite Horizon Multicast

Opportunistic Beamforming for Finite Horizon Multicast Opportunstc Beamformng for Fnte Horzon Multcast Gek Hong Sm, Joerg Wdmer, and Balaj Rengarajan allyson.sm@mdea.org, joerg.wdmer@mdea.org, and balaj.rengarajan@gmal.com Insttute IMDEA Networks, Madrd, Span

More information

Characterization and Analysis of Multi-Hop Wireless MIMO Network Throughput

Characterization and Analysis of Multi-Hop Wireless MIMO Network Throughput Characterzaton and Analyss of Mult-Hop Wreless MIMO Network Throughput Bechr Hamdaou EECS Dept., Unversty of Mchgan 226 Hayward Ave, Ann Arbor, Mchgan, USA hamdaou@eecs.umch.edu Kang G. Shn EECS Dept.,

More information

On the Feasibility of Receive Collaboration in Wireless Sensor Networks

On the Feasibility of Receive Collaboration in Wireless Sensor Networks On the Feasblty of Receve Collaboraton n Wreless Sensor Networs B. Bantaleb, S. Sgg and M. Begl Computer Scence Department Insttute of Operatng System and Computer Networs (IBR) Braunschweg, Germany {behnam,

More information

Autonomous Dynamic Spectrum Management for Coexistence of Multiple Cognitive Tactical Radio Networks

Autonomous Dynamic Spectrum Management for Coexistence of Multiple Cognitive Tactical Radio Networks Autonomous Dynamc Spectrum Management for Coexstence of Multple Cogntve Tactcal Rado Networks Vncent Le Nr, Bart Scheers Abstract In ths paper, dynamc spectrum management s studed for multple cogntve tactcal

More information

Dynamic Pricing Approach for Spectrum Allocation in Wireless Networks with Selfish Users

Dynamic Pricing Approach for Spectrum Allocation in Wireless Networks with Selfish Users Dynamc Prcng Approach for Spectrum Allocaton n Wreless Networks wth Selfsh Users Zhu J and K. J. Ray Lu Electrcal and Computer Engneerng Department and Insttute for Systems Research Unversty of Maryland,

More information

Capacity Estimation of Non-Synchronous Covert Channels

Capacity Estimation of Non-Synchronous Covert Channels Capacty Estmaton of on-ynchronous s Zhenghong Wang and uby B. Lee Department of Electrcal Engneerng Prnceton Unversty {zhenghon,rblee}@prnceton.edu Abstract Capacty estmaton s an mportant part of covert

More information

Cooperative Multicast Scheduling Scheme for IPTV Service over IEEE Networks

Cooperative Multicast Scheduling Scheme for IPTV Service over IEEE Networks Cooperatve Multcast Schedulng Scheme for IPTV Servce over IEEE 802.16 Networks Fen Hou 1, Ln X. Ca 1, James She 1, Pn-Han Ho 1, Xuemn (Sherman Shen 1, and Junshan Zhang 2 Unversty of Waterloo, Waterloo,

More information

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014 Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,

More information

The Effect Of Phase-Shifting Transformer On Total Consumers Payments

The Effect Of Phase-Shifting Transformer On Total Consumers Payments Australan Journal of Basc and Appled Scences 5(: 854-85 0 ISSN -88 The Effect Of Phase-Shftng Transformer On Total Consumers Payments R. Jahan Mostafa Nck 3 H. Chahkand Nejad Islamc Azad Unversty Brjand

More information

Hierarchical Generalized Cantor Set Modulation

Hierarchical Generalized Cantor Set Modulation 8th Internatonal Symposum on Wreless Communcaton Systems, Aachen Herarchcal Generalzed Cantor Set Modulaton Smon Görtzen, Lars Schefler, Anke Schmenk Informaton Theory and Systematc Desgn of Communcaton

More information

Game-Theoretic Spectrum Trading in RF Relay-Assisted Free-Space Optical Communications

Game-Theoretic Spectrum Trading in RF Relay-Assisted Free-Space Optical Communications Game-Theoretc Spectrum Tradng n RF Relay-Asssted Free-Space Optcal Communcatons 1 arxv:1806.10464v1 [cs.it] 27 Jun 2018 Shenje Huang, Student Member, IEEE, Vahd Shah-Mansour, Member, IEEE, and Majd Safar,

More information

Multi-sensor optimal information fusion Kalman filter with mobile agents in ring sensor networks

Multi-sensor optimal information fusion Kalman filter with mobile agents in ring sensor networks Mult-sensor optmal nformaton fuson Kalman flter wth moble agents n rng sensor networs Behrouz Safarneadan *, Kazem asanpoor ** *Shraz Unversty of echnology, safarnead@sutech.ac.r ** Shraz Unversty of echnology,.hasanpor@gmal.com

More information

Distributed Energy Efficient Spectrum Access in Cognitive Radio Wireless Ad Hoc Networks

Distributed Energy Efficient Spectrum Access in Cognitive Radio Wireless Ad Hoc Networks Dstrbuted Energy Effcent Spectrum Access n Cogntve Rado Wreless Ad Hoc Networks Song Gao, Ljun Qan, Dhadesugoor. R. Vaman ARO/ARL Center for Battlefeld Communcatons Research Prare Vew A&M Unversty, Texas

More information